Skip to content
Snippets Groups Projects
Commit 10b250df authored by Pavel Grafov's avatar Pavel Grafov
Browse files

Revert "Neverallow vendor code access to files on /system."

This reverts commit c855629e.

Reason for revert: breaks builds for some devices in master

Change-Id: I02c0967d6607ef0173b4188c06d2e781c3c93f4b
parent 4c8eaba7
No related branches found
No related tags found
No related merge requests found
...@@ -1091,10 +1091,9 @@ full_treble_only(` ...@@ -1091,10 +1091,9 @@ full_treble_only(`
-vendor_executes_system_violators -vendor_executes_system_violators
-vendor_init -vendor_init
} { } {
system_file_type exec_type
-system_file # TODO(b/111243627): remove once Treble violations are fixed.
-system_lib_file
-system_linker_exec -system_linker_exec
-vendor_file_type
-crash_dump_exec -crash_dump_exec
-netutils_wrapper_exec -netutils_wrapper_exec
userdebug_or_eng(`-tcpdump_exec') userdebug_or_eng(`-tcpdump_exec')
...@@ -1157,33 +1156,17 @@ full_treble_only(` ...@@ -1157,33 +1156,17 @@ full_treble_only(`
}:file *; }:file *;
') ')
full_treble_only(` # TODO(b/111243627): Uncomment once all violations are cleaned up.
# Do not allow vendor components access to /system files except for the #full_treble_only(`
# ones whitelisted here. # # Do not allow vendor components access to /system files except for the
neverallow { # # ones whitelisted here.
domain # neverallow {
-appdomain # domain
-coredomain # -appdomain
-vendor_executes_system_violators # -coredomain
# vendor_init needs access to init_exec for domain transition. vendor_init # -vendor_executes_system_violators
# neverallows are covered in public/vendor_init.te # } system_file_type:file *;
-vendor_init #')
} {
system_file_type
-system_file # TODO(b/111243627): remove once Treble violations are fixed.
-crash_dump_exec
-file_contexts_file
-netutils_wrapper_exec
-property_contexts_file
-system_lib_file
-system_linker_exec
-system_linker_config_file
-system_seccomp_policy_file
-system_security_cacerts_file
-system_zoneinfo_file
userdebug_or_eng(`-tcpdump_exec')
}:file *;
')
# Only authorized processes should be writing to files in /data/dalvik-cache # Only authorized processes should be writing to files in /data/dalvik-cache
neverallow { neverallow {
... ...
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please to comment